US20170104870A1 - A method to authenticate calls in a telecommunication system - Google Patents
A method to authenticate calls in a telecommunication system Download PDFInfo
- Publication number
- US20170104870A1 US20170104870A1 US15/312,337 US201515312337A US2017104870A1 US 20170104870 A1 US20170104870 A1 US 20170104870A1 US 201515312337 A US201515312337 A US 201515312337A US 2017104870 A1 US2017104870 A1 US 2017104870A1
- Authority
- US
- United States
- Prior art keywords
- call
- request
- calling party
- party
- token
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6027—Fraud preventions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6045—Identity confirmation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
Definitions
- the present invention generally relates to communications using electronic devices in telecommunication networks, and more specifically to enhanced communications services.
- a phone or device is generally a subscriber to a telecommunication network in order to enjoy communication services, such as voice, data, . . . for mobile phones, or handover between landline and mobile phones.
- a subscriber to a telecommunication network is generally identified through its identifier in the network, like his phone number.
- the identifier When presented during a call placed from a calling device, the identifier is referred as the Caller Identifier or Caller ID in short.
- MSISDN Mobile Station International Subscriber Directory Number
- a mobile device generally comes with a Subscriber Identity Module (SIM), unique to one subscriber and carries information to identify that subscriber in his home network, i.e. the network he is a subscriber of. This information includes the International mobile Subscriber Identity (IMSI) and other authentication data.
- SIM Subscriber Identity Module
- IMSI International mobile Subscriber Identity
- GSM Global System for Mobile communications
- UMTS Universal Mobile Telecommunications System
- Landline devices such as home devices or work devices, are also associated to a phone number to be presented as the Caller ID.
- the Caller ID of the calling device is generally used by the called device to look up in a directory or contact list to present an enhanced Caller ID comprises a name, and even a picture or live data, when the Caller ID is associated to a live stream for the contact.
- the Caller ID can nonetheless be deceiving.
- Telco related consumer fraud is growing across different markets, where the fraudsters/impostors pretend to be a business or a service provider, like a financial institution, and call customers using a fake Caller ID to gather personal information.
- imposters can easily modify their Caller ID to known institutions such as Financial or Health Care provider to deceive the customer.
- Google devices offer a Caller ID search by searching the web based on the Caller ID from an incoming call, and displaying the name of the found business with the Caller ID on the called device. As the caller ID may already be compromised even prior to the Google search, this service will contribute to deceiving the user as displaying wrong information and lead the customer to believe that this call is from trusted party.
- the present system proposes a method to verify a calling party when placing a call to a recipient party, the method comprising:
- API Application Program Interface
- a method is provided to allow calls from pre-registered calling parties. Only parties with a registration token may be allowed to place certified calls to recipient parties. Thus the callee can enjoy a sense of security knowing that the entity the incoming call originates from is a verified entity.
- the present system also proposed a call verification server to verify a calling party when placing a call to a recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
- API Application Program Interface
- a telecommunication system in accordance with the present system may include
- the call verification server comprising an Application Program Interface (API) platform and being configured to:
- API Application Program Interface
- An application embodied on a computer readable medium in accordance with the present system may be configured to verify a calling party when placing a call to a recipient party, the application comprising instructions for:
- API Application Program Interface
- FIG. 1A shows an first illustrative embodiment of the present system
- FIG. 1B shows a second illustrative embodiment of the present system
- FIG. 2A is a flowchart illustrating an embodiment of the present method, and
- FIG. 2B shows further acts of the flow chart of FIG. 2A .
- routers, servers, nodes, base stations, gateways or other entities in a telecommunication network are not detailed as their implementation is beyond the scope of the present system and method.
- a “call” in this description may be a standard voice call or any other communication session established between a first party, referred to as the calling party or caller, and a second party, referred to as the called party or callee.
- the call is placed more precisely between the users telecommunication devices, i.e. the calling device and the called or recipient device, for instance a video call between the first and second parties, or data exchange between devices.
- Each side of the call in the telecommunication network will be referred to a branch or a leg of the call.
- the call may also be referred to as a communication path between the two devices. When a communication path is set up between both calling and called devices, different entities of the present telecommunication system are involved and this path generally involves a two level exchange mechanism:
- a signaling level corresponding to the signaling (or set up) messages exchanges through the network entities between the two devices
- a media level for handling data voice (when Voice over IP) . . .
- the calling and called devices will also be referred to as end points as they represent both ends to the communication path.
- FIG. 1A shows a first exemplary embodiment of the present system.
- a first device 101 for User A is associated to a first Caller ID Caller_ID_A.
- Caller_ID_A In existing system, when placing or making a call to a second device 102 , associated to the User B, Caller_ID_A will be presented to that second device 102 . As mentioned before, imposters may use a fake Caller_ID_A to present to the second device 102 .
- the first device 101 may comprise a client or application CLIENT_ 1 (not shown in the present FIG. 1A ) to send a request to a call verification server 100 (CVS) for registration to a call—or calling party—verification service.
- CVS call verification server 100
- the present CVS 100 may comprise:
- API Application Program Interface
- CCM Call Control Module
- Call control that corresponds to the central function of a telephone switch.
- Call control offers different features such as decoding addressing information and routing telephone calls from one end point to another. It also creates added features such as “Call Waiting”, “Call Forward on Busy”, and “Do Not Disturb”. This function handles the signaling level mentioned before in regards to the communication between the two devices,
- a Media function to handle the entire media part of a communication between two end points. This function corresponds to the over level, i.e. the media level mentioned before.
- CVS 100 may store in database 115 an entry for the calling party, and allocate a first registration token that is associated at the API platform with an entry for the calling party. The storage of the registration token allows the subsequent identification of the calling party, whenever calling an API using that first token.
- the first token is sent to the calling party and stored thereon, when received, by the agent CLIENT_ 1 .
- the calling party may proceed with a call using the call verification service of the present system. Rather than calling directly the called party 102 , the calling party will make a second request, using the client CLIENT_ 1 , to the API platform 110 , to set up a call.
- the second request will comprise:
- data for the called party recipient to the call may be for instance its phone number,
- the server 100 From the CVS side, the server 100 will receive at the API platform 110 a request from the calling party to set up a call, the request comprising data for a recipient party for the call, and a second token.
- the CVS will look up in database 115 the registration token associated to the calling party and compare it to the received token in the call set up request. Provided there is a match between the received second token and the first registration token stored for the calling party, the CVS 100 will proceed with setting up, i.e. connecting, a call between the calling party and the recipient/called party using the CCM 120 .
- FIG. 1B is an alternative embodiment of the present system.
- the CVS 100 , its database 115 , its CCM 120 and the API platform 110 are similar to the corresponding references in FIG. 1A .
- a plurality of calling devices 101 Ai illustrated as devices 101 A 1 , associated to user A 1 , and 101 A 2 , associated to user A 2 , are hosted behind a PBX (Private Branch eXchange) 150 of e.g. a company.
- Each calling device 101 Ai may be associated to a caller ID Caller_ID_Ai with the PBX.
- the request for registration to the call verification service may be handled at the PBX level, the first registration token being associated to the company, i.e. an identifier for the PBX.
- the PBX identifier may be added to the call set up messages so that the API platform identifies the PBX 150 and retrieve the right registration token associated in database 115 to the company.
- the PBX may be configured to call the different APIs offered by the API platform 110 from the CVS 100 .
- the PBX illustration is a mere example of a different embodiment of the present call verification service as it may be replaced by a carrier network bridging another network where the CVS 100 is hosted.
- One may note that illustrating the CVS 100 as comprising two parts is in no way limiting as these two parts could be hosted by the same node or server, or being operatively linked to each other.
- the two part presentation helps to illustrate the different tasks and functions performed by the CVS 100 in the present system.
- FIG. 2A is a flow chart illustrating an exemplary embodiment of the present method, wherein the first device 101 of FIG. 1A places a call to the second device 102 using the present call verification service.
- the present acts are carried out by the CVS 100 , more precisely a processor running an application comprising instructions to execute the present computer implemented method.
- the calling device 101 may download an application like CLIENT_ 1 for enabling the present call verification service.
- the application may be available through a platform operatively connected to the CVS 100 the user A may register with using for instance a login and password.
- the user may obtain the application CLIENT_ 1 from an application store the calling device may operate with.
- the service When available through a PBX of a company, the service may be enabled at the PBX level through a software or application running on the company's network.
- a calling device 101 like a mobile phone.
- the present teachings may be applied by the man skilled in the art to electronic devices behind a PBX or a carrier network like in the illustration of FIG. 2B or a landline device connected to a set top box or the PSTN (Public Switch Network).
- PSTN Public Switch Network
- the CVS 100 will receive at the API platform 110 a request from the calling party 101 for registration to the calling party—or call—verification service of the present system. This corresponds to the setup message “setup 1 ” in FIGS. 1A and 1B .
- the request for registration further comprises a first identifier for the calling party.
- This may be for instance the Caller ID Caller_ID_A for the calling device 101 or another identifier, like a User A login for the call verification service of the present system.
- the PBX embodiment it may be a login or registration ID for the company.
- the identifier may be stored at the CVS 100 , e.g. in database 1151 and used as seen here after either to increase security of the service, generate the registration token or an enhanced Caller ID.
- the CVS 100 may verify whether calling party 101 is an imposter or not.
- Different techniques like the certification proposed in document US20110085650A1, may be used at this stage and are beyond the scope of the present system.
- the registration may include a premium registration wherein the calling party has to go through a detailed registration, including e.g. payment, so as to further verify the calling party.
- the call verification service may carry on to act 230 .
- the service will proceed with act 255 , i.e. reject the request for registration.
- the request for registration in act 210 may be followed directly by the act 230 .
- the CVS 100 will send to the calling party 101 , as a response to the request for registration, a first token associated at the API platform 110 to the calling party. This corresponds to the setup message “setup 2 ” in FIGS. 1A and 1B .
- the association may be carried out by storing at the API platform the calling party first identifier in relation to the first token, for instance in database 115 .
- the act 230 may further comprise an act (not shown in FIG. 2A ) wherein the CVS 100 generates the registration token based on the first identifier.
- a hashing technique may be used for instance so as to make sure the token is unique to the calling party.
- the CVS 100 may be operated by a telecommunication operator, or TelCo, which acts as a call verification entity.
- TelCo may uses latest available technology to verify the calling party (e.g. using private public keys, shared keys, unique keys, one-time use keys, etc..) to generate the registration token.
- These security parameters may be preconfigured based on the relationship or business model between Telco and businesses.
- the calling party will store the registration token for further use when calling an API from the API platform 110 of CVS 100 .
- the calling party may enable its callee to verify the calling party origin. To do so, whenever placing a call to a called or recipient party 102 , the calling party will request to set up a call using a call request API from the API platform 110 . This corresponds to the setup message “setup 3 ” in FIGS. 1A and 1B .
- the request may comprise data for the calling party, and the first token to be identified by the CVS 100 .
- the request to set up a call may further comprise the calling party identifier as stored at the API platform 150 .
- the CVS will receive a request for setting up a call to the recipient party, the request comprising a recipient or called party for the call, and a second token. This corresponds to the first leg of the call between the calling and the called parties.
- the CVS 100 will then proceed with verifying if the received second token corresponds to a registration token as stored at the API platform, i.e. if the calling party registered with the CVS 100 prior to requesting a call.
- the match may comprise searching through allocated registration tokens the one matching the received second token.
- the CVS 100 will retrieve the registration token stored in database 115 at the entry corresponding to the calling party identifier. More complex matching or verification scenarios may be envisaged to increase security of the registration and verification process.
- the request will be rejected in further act 255 .
- the CVS 100 will proceed with setting up a call between the calling party 101 and the called party 102 in a further act 270 using the CCM 120 . This corresponds to the setup message “setup 4 ” in FIGS. 1A and 1B and the second leg of the call.
- the matching tokens ensure that the calling party was first registered with the CVS 100 , server that will subsequently set the call to the recipient party 102 upon recognition of a previously allocated registration token.
- a verified call is established between the calling party and the called party, by joining e.g. the two legs of the call.
- the call set up of act 270 may further comprise the presentation of a first notification to the called device. This corresponds to the setup message “setup 5 ” in FIGS. 1A and 1B .
- the first notification simply may be the Caller ID of the calling device, or an enhanced Caller ID to show the callee that the incoming call is certified.
- the first notification presented to the called device comprises an indication that the call is verified.
- the CVS 100 will generate a Caller ID for the incoming call using the calling party identifier.
- the calling party identifier may come from the identifier stored with the calling party registration token or a second identifier comprised in the call set up request received in act 240 .
- the generated Caller ID may be referred to as an enhanced Caller ID and may comprise one or more of:
- the first notification or enhanced Caller ID may be pushed through the CCM 120 so as to be presented to the callee. Such an enhanced Caller ID may actually be based on the result of the match between the registration token, and the token received in the call set up request.
- the first notification may be presented to the user using different paths, for instance through a short message, or through a voice notification. Different notifications may be used to present the indication that the incoming call is verified.
- the call set up of act 270 may not be only conditioned to a match between the allocated registration token and the received token. Indeed, in a further embodiment of the present system, the call set up may be further conditioned to a match between the stored identifier for the calling party (as known from the registration of act 210 ) and a second identifier in the call set up request received at the API platform 150 .
- the call set up may be conditioned to further verification as follows.
- the call set up may indeed offer the possibility to the callee to place a request for further verification.
- the first notification displayed on the called device, with the indication that the call is verified may indeed comprise an active element the callee may select to send a request for further verifications.
- the notification is received e.g. through a text
- the user B may reply to the text to request further verification.
- the CVS 100 will receive in reply to the first notification, a request for further verification from the recipient party 102 . This corresponds to the setup message “setup 6 ” in FIGS. 1A and 1B .
- data related to the recipient party will be retrieved at the API platform.
- the CVS will check if the recipient party is a first time user to the call verification service.
- the CVS 100 will request a challenge from the recipient party in a further act 280 .
- the challenge will correspond to a user defined test uniquely known to the user, thereby showing that the call is actually a verified call under the present call verification service.
- the challenge may be for instance a voice prompt that the user B of the recipient device may record for subsequent replay with each incoming verified call.
- Such a challenge will be stored in a further act 282 in relation to the recipient party in database 115 , using for instance its phone number at the entry in the database.
- the service may carry on with presenting further information about the calling party in an act 282 , such as full name, website info, or any other data collected during registration of acts 210 - 230 in FIG. 2A .
- the CVS 100 will retrieve in database 115 the data stored in relation to the recipient party entry in a further act 290 , e.g. the challenge provided in act 280 .
- the challenge such as a voice prompt with the User B own voice, will be presented to the recipient device. This may alternatively be further questions, or recognition of objects initially provided by the user B.
- the CVS will present a second notification based on the retrieved data, here the stored challenge. This corresponds to the setup message “setup 7 ” in FIGS. 1A and 1B .
- the present call verification service will proceed to act 284 with providing additional information about the calling party.
- a call i.e. a communication path, is established between the calling party and the recipient party.
- a user can enjoy a call verification service allowing only certified/verified calls from calling parties such as businesses.
- the CVS 100 Using a token provided at registration of a calling party, the CVS 100 will only process calls from registered parties.
- the present system also bring enhanced trust to the callee as to whom is behind the incoming call.
Abstract
The present system discloses a method to verify a calling party when placing a call to a recipient party, the method comprising receiving at an Application Program Interface (API) platform a request from a calling party for registration for the calling party verification, sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party, receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token, and setting up a call to the recipient party, when there is a match between the first and second token.
Description
- The present invention generally relates to communications using electronic devices in telecommunication networks, and more specifically to enhanced communications services.
- Phones such as mobile and landline have become important devices in our daily life. A phone or device is generally a subscriber to a telecommunication network in order to enjoy communication services, such as voice, data, . . . for mobile phones, or handover between landline and mobile phones.
- A subscriber to a telecommunication network is generally identified through its identifier in the network, like his phone number. When presented during a call placed from a calling device, the identifier is referred as the Caller Identifier or Caller ID in short.
- For a mobile, his MSISDN (Mobile Station International Subscriber Directory Number) is actually the mobile device phone number. A mobile device generally comes with a Subscriber Identity Module (SIM), unique to one subscriber and carries information to identify that subscriber in his home network, i.e. the network he is a subscriber of. This information includes the International mobile Subscriber Identity (IMSI) and other authentication data. The mobile IMSI is a unique number associated with all GSM (Global System for Mobile communications) and Universal Mobile Telecommunications System (UMTS) network mobile phone users. The SIM and its IMSI may be associated to several MSISDN.
- Landline devices, such as home devices or work devices, are also associated to a phone number to be presented as the Caller ID.
- The Caller ID of the calling device is generally used by the called device to look up in a directory or contact list to present an enhanced Caller ID comprises a name, and even a picture or live data, when the Caller ID is associated to a live stream for the contact. The Caller ID can nonetheless be deceiving.
- Indeed, Telco related consumer fraud is growing across different markets, where the fraudsters/impostors pretend to be a business or a service provider, like a financial institution, and call customers using a fake Caller ID to gather personal information. Today, imposters can easily modify their Caller ID to known institutions such as Financial or Health Care provider to deceive the customer.
- Today there is no solution for customers to verify if the call is coming from a known or certified service provider. Most of the customers rely on the caller ID to filter or screen a call. Google devices offer a Caller ID search by searching the web based on the Caller ID from an incoming call, and displaying the name of the found business with the Caller ID on the called device. As the caller ID may already be compromised even prior to the Google search, this service will contribute to deceiving the user as displaying wrong information and lead the customer to believe that this call is from trusted party.
- Another solution is proposed in document US20110085650A1 wherein the Caller ID is used to check with a certification server where the call originates from. Nevertheless, this is still a Caller ID based approach that can be worked around by mimicking a false Caller ID.
- Today there is still a need for a simple solution that allows an efficient Caller ID screening and certification for a user when receiving a call. There is a further need for a system service providers can use easily to present a certified Caller ID to a callee/user.
- It is an object of the present system, processor and method to overcome disadvantages and/or make improvements in the prior art.
- To that extent, the present system proposes a method to verify a calling party when placing a call to a recipient party, the method comprising:
- receiving at an Application Program Interface (API) platform a request from a calling party for registration for the calling party verification,
- sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
- receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
- setting up a call to the recipient party, when there is a match between the first and second token.
- Thanks to the present system, a method is provided to allow calls from pre-registered calling parties. Only parties with a registration token may be allowed to place certified calls to recipient parties. Thus the callee can enjoy a sense of security knowing that the entity the incoming call originates from is a verified entity.
- The present system also proposed a call verification server to verify a calling party when placing a call to a recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
- receive at the API platform a request from a calling party for registration for the calling party verification,
- send to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
- receive at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
- set up a call to the recipient party, when there is a match between the first and second token.
- A telecommunication system in accordance with the present system may include
- a calling party
- a recipient party
- a call verification server to verify the calling party when placing a call to the recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
- receive at the API platform a request from a calling party for registration for the calling party verification,
- send to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
- receive at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
- set up a call to the recipient party, when there is a match between the first and second token.
- An application embodied on a computer readable medium in accordance with the present system may be configured to verify a calling party when placing a call to a recipient party, the application comprising instructions for:
- receiving at an Application Program Interface (API) platform a request from the calling party for registration for the calling party verification,
- sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
- receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
- setting up a call to the recipient party, when there is a match between the first and second token.
- The present system, call management node and method are explained in further detail, and by way of example, with reference to the accompanying drawings wherein:
-
FIG. 1A shows an first illustrative embodiment of the present system, -
FIG. 1B shows a second illustrative embodiment of the present system, -
FIG. 2A is a flowchart illustrating an embodiment of the present method, and; -
FIG. 2B shows further acts of the flow chart ofFIG. 2A . - The following are descriptions of exemplary embodiments that when taken in conjunction with the drawings will demonstrate the above noted features and advantages, and introduce further ones.
- In the following description, for purposes of explanation rather than limitation, specific details are set forth such as architecture, interfaces, techniques, etc., for illustration. However, it will be apparent to those of ordinary skill in the art that other embodiments that depart from these details would still be understood to be within the scope of the appended claims.
- Moreover, for the purpose of clarity, detailed descriptions of well-known devices, systems, and methods are omitted so as not to obscure the description of the present system. Furthermore, routers, servers, nodes, base stations, gateways or other entities in a telecommunication network are not detailed as their implementation is beyond the scope of the present system and method.
- This illustration is in no way a limitation of the scope of the present method and system as communication devices such as fixed devices or communication devices behind a PBX (Private Branch eXchange), and more generally any device registered for communication services in an operator network can benefit from the present teachings.
- Furthermore, what will be referred to as a “call” in this description may be a standard voice call or any other communication session established between a first party, referred to as the calling party or caller, and a second party, referred to as the called party or callee. One will understand of course that the call is placed more precisely between the users telecommunication devices, i.e. the calling device and the called or recipient device, for instance a video call between the first and second parties, or data exchange between devices. Each side of the call in the telecommunication network will be referred to a branch or a leg of the call. The call may also be referred to as a communication path between the two devices. When a communication path is set up between both calling and called devices, different entities of the present telecommunication system are involved and this path generally involves a two level exchange mechanism:
- a signaling level corresponding to the signaling (or set up) messages exchanges through the network entities between the two devices,
- a media level for handling data, voice (when Voice over IP) . . .
- Furthermore, the calling and called devices will also be referred to as end points as they represent both ends to the communication path.
- In addition, it should be expressly understood that the drawings are included for illustrative purposes and do not represent the scope of the present system.
-
FIG. 1A shows a first exemplary embodiment of the present system. Afirst device 101 for User A is associated to a first Caller ID Caller_ID_A. In existing system, when placing or making a call to asecond device 102, associated to the User B, Caller_ID_A will be presented to thatsecond device 102. As mentioned before, imposters may use a fake Caller_ID_A to present to thesecond device 102. - In this first exemplary embodiment of the present system, the
first device 101 may comprise a client or application CLIENT_1 (not shown in the presentFIG. 1A ) to send a request to a call verification server 100 (CVS) for registration to a call—or calling party—verification service. To offer such a service, through theserver 100, thepresent CVS 100 may comprise: - an API (Application Program Interface)
platform 110 enabling the agent of firstelectronic device 101 to interact with theCVS 100 and the call verification service, - a CCM (Call Control Module) 120 to handle the communication path between the two
devices - a) a Call Control function that corresponds to the central function of a telephone switch. Call control offers different features such as decoding addressing information and routing telephone calls from one end point to another. It also creates added features such as “Call Waiting”, “Call Forward on Busy”, and “Do Not Disturb”. This function handles the signaling level mentioned before in regards to the communication between the two devices,
- b) a Media function to handle the entire media part of a communication between two end points. This function corresponds to the over level, i.e. the media level mentioned before.
- When receiving at the API platform 110 a request from the calling
party 110 for registration to the calling party verification service,CVS 100 may store indatabase 115 an entry for the calling party, and allocate a first registration token that is associated at the API platform with an entry for the calling party. The storage of the registration token allows the subsequent identification of the calling party, whenever calling an API using that first token. - As a response to the request for registration, the first token is sent to the calling party and stored thereon, when received, by the agent CLIENT_1.
- Once registered, the calling party may proceed with a call using the call verification service of the present system. Rather than calling directly the called
party 102, the calling party will make a second request, using the client CLIENT_1, to theAPI platform 110, to set up a call. The second request will comprise: - data for the called party recipient to the call. Such data may be for instance its phone number,
- the first registration token.
- From the CVS side, the
server 100 will receive at the API platform 110 a request from the calling party to set up a call, the request comprising data for a recipient party for the call, and a second token. - The CVS will look up in
database 115 the registration token associated to the calling party and compare it to the received token in the call set up request. Provided there is a match between the received second token and the first registration token stored for the calling party, theCVS 100 will proceed with setting up, i.e. connecting, a call between the calling party and the recipient/called party using theCCM 120. - Other functionalities, such as an enhanced caller ID presentation may also be enabled through the present system as explained here after.
-
FIG. 1B is an alternative embodiment of the present system. TheCVS 100, itsdatabase 115, itsCCM 120 and theAPI platform 110 are similar to the corresponding references inFIG. 1A . A plurality of calling devices 101Ai, illustrated as devices 101A1, associated to user A1, and 101A2, associated to user A2, are hosted behind a PBX (Private Branch eXchange) 150 of e.g. a company. Each calling device 101Ai may be associated to a caller ID Caller_ID_Ai with the PBX. In the present system, the request for registration to the call verification service may be handled at the PBX level, the first registration token being associated to the company, i.e. an identifier for the PBX. When placing a call from one of the callingdevices 101 Ai, the PBX identifier may be added to the call set up messages so that the API platform identifies thePBX 150 and retrieve the right registration token associated indatabase 115 to the company. - Such an embodiment using a PBX can enjoy the same services as the ones for an individual user of
FIG. 1A and described here after. The PBX may be configured to call the different APIs offered by theAPI platform 110 from theCVS 100. - The PBX illustration is a mere example of a different embodiment of the present call verification service as it may be replaced by a carrier network bridging another network where the
CVS 100 is hosted. One may note that illustrating theCVS 100 as comprising two parts is in no way limiting as these two parts could be hosted by the same node or server, or being operatively linked to each other. The two part presentation helps to illustrate the different tasks and functions performed by theCVS 100 in the present system. -
FIG. 2A is a flow chart illustrating an exemplary embodiment of the present method, wherein thefirst device 101 ofFIG. 1A places a call to thesecond device 102 using the present call verification service. The present acts are carried out by theCVS 100, more precisely a processor running an application comprising instructions to execute the present computer implemented method. - In a preliminary act not shown in
FIG. 2A , the callingdevice 101 may download an application like CLIENT_1 for enabling the present call verification service. The application may be available through a platform operatively connected to theCVS 100 the user A may register with using for instance a login and password. Alternatively, the user may obtain the application CLIENT_1 from an application store the calling device may operate with. - When available through a PBX of a company, the service may be enabled at the PBX level through a software or application running on the company's network. In the hereafter description, reference will be made to a
calling device 101, like a mobile phone. More generally, the present teachings may be applied by the man skilled in the art to electronic devices behind a PBX or a carrier network like in the illustration ofFIG. 2B or a landline device connected to a set top box or the PSTN (Public Switch Network). - In an
act 210, corresponding to the registration of thecalling device 101 to the call verification service, theCVS 100 will receive at the API platform 110 a request from the callingparty 101 for registration to the calling party—or call—verification service of the present system. This corresponds to the setup message “setup 1” inFIGS. 1A and 1B . - In an additional embodiment of the present system, the request for registration further comprises a first identifier for the calling party. This may be for instance the Caller ID Caller_ID_A for the
calling device 101 or another identifier, like a User A login for the call verification service of the present system. For the PBX embodiment, it may be a login or registration ID for the company. - The identifier may be stored at the
CVS 100, e.g. in database 1151 and used as seen here after either to increase security of the service, generate the registration token or an enhanced Caller ID. - In a further and optional act 220 (shown in dotted lines in
FIG. 2A ), theCVS 100 may verify whether callingparty 101 is an imposter or not. Different techniques, like the certification proposed in document US20110085650A1, may be used at this stage and are beyond the scope of the present system. For instance the registration may include a premium registration wherein the calling party has to go through a detailed registration, including e.g. payment, so as to further verify the calling party. - Provided the authentication is granted (answer Yes to act 220), the call verification service may carry on to act 230. Provided the authentication is rejected (answer No to act 220), the service will proceed with
act 255, i.e. reject the request for registration. - Alternatively, the request for registration in
act 210 may be followed directly by theact 230. In afurther act 230 of the present method, theCVS 100 will send to the callingparty 101, as a response to the request for registration, a first token associated at theAPI platform 110 to the calling party. This corresponds to the setup message “setup 2” inFIGS. 1A and 1B . The association may be carried out by storing at the API platform the calling party first identifier in relation to the first token, for instance indatabase 115. - Different techniques may be used to generate the first token, it may be chosen randomly at the CVS level. Alternatively, in an additional embodiment of the present system, the
act 230 may further comprise an act (not shown inFIG. 2A ) wherein theCVS 100 generates the registration token based on the first identifier. A hashing technique may be used for instance so as to make sure the token is unique to the calling party. - More generally, in the present system, the
CVS 100 may be operated by a telecommunication operator, or TelCo, which acts as a call verification entity. A TelCo may uses latest available technology to verify the calling party (e.g. using private public keys, shared keys, unique keys, one-time use keys, etc..) to generate the registration token. These security parameters may be preconfigured based on the relationship or business model between Telco and businesses. - In a further act (not shown in
FIG. 2A ), the calling party will store the registration token for further use when calling an API from theAPI platform 110 ofCVS 100. Thanks to the present call verification service, the calling party may enable its callee to verify the calling party origin. To do so, whenever placing a call to a called orrecipient party 102, the calling party will request to set up a call using a call request API from theAPI platform 110. This corresponds to the setup message “setup 3” inFIGS. 1A and 1B . The request may comprise data for the calling party, and the first token to be identified by theCVS 100. Optionally the request to set up a call may further comprise the calling party identifier as stored at theAPI platform 150. - Consequently, in a
further act 240, the CVS will receive a request for setting up a call to the recipient party, the request comprising a recipient or called party for the call, and a second token. This corresponds to the first leg of the call between the calling and the called parties. TheCVS 100 will then proceed with verifying if the received second token corresponds to a registration token as stored at the API platform, i.e. if the calling party registered with theCVS 100 prior to requesting a call. The match may comprise searching through allocated registration tokens the one matching the received second token. Alternatively, when the identifier for the calling party is provided in the call set up request, theCVS 100 will retrieve the registration token stored indatabase 115 at the entry corresponding to the calling party identifier. More complex matching or verification scenarios may be envisaged to increase security of the registration and verification process. - Provided there is no match between the received token from the call setup request and the token stored for the calling party (answer No to act 250), the request will be rejected in
further act 255. Provided there is a match (answer Yes to act 250), theCVS 100 will proceed with setting up a call between the callingparty 101 and the calledparty 102 in afurther act 270 using theCCM 120. This corresponds to the setup message “setup 4” inFIGS. 1A and 1B and the second leg of the call. The matching tokens ensure that the calling party was first registered with theCVS 100, server that will subsequently set the call to therecipient party 102 upon recognition of a previously allocated registration token. - Thus, a verified call is established between the calling party and the called party, by joining e.g. the two legs of the call.
- The call set up of
act 270 may further comprise the presentation of a first notification to the called device. This corresponds to the setup message “setup 5” inFIGS. 1A and 1B . The first notification simply may be the Caller ID of the calling device, or an enhanced Caller ID to show the callee that the incoming call is certified. In an additional embodiment of the present system, the first notification presented to the called device comprises an indication that the call is verified. - To do so, in a further
optional act 260 in dotted lines inFIG. 2A , theCVS 100 will generate a Caller ID for the incoming call using the calling party identifier. The calling party identifier may come from the identifier stored with the calling party registration token or a second identifier comprised in the call set up request received inact 240. The generated Caller ID may be referred to as an enhanced Caller ID and may comprise one or more of: - an indication of the calling party identifier,
- an indication that the call is verified, e.g. “Orange certified call” added in the notification to the call. The first notification or enhanced Caller ID may be pushed through the
CCM 120 so as to be presented to the callee. Such an enhanced Caller ID may actually be based on the result of the match between the registration token, and the token received in the call set up request. - The first notification may be presented to the user using different paths, for instance through a short message, or through a voice notification. Different notifications may be used to present the indication that the incoming call is verified.
- The call set up of
act 270 may not be only conditioned to a match between the allocated registration token and the received token. Indeed, in a further embodiment of the present system, the call set up may be further conditioned to a match between the stored identifier for the calling party (as known from the registration of act 210) and a second identifier in the call set up request received at theAPI platform 150. - The call set up may be conditioned to further verification as follows. The call set up may indeed offer the possibility to the callee to place a request for further verification. The first notification displayed on the called device, with the indication that the call is verified, may indeed comprise an active element the callee may select to send a request for further verifications. Alternatively, when the notification is received e.g. through a text, the user B may reply to the text to request further verification.
- In a
further act 275, theCVS 100 will receive in reply to the first notification, a request for further verification from therecipient party 102. This corresponds to the setup message “setup 6” inFIGS. 1A and 1B . In a subsequent act, data related to the recipient party will be retrieved at the API platform. - To do so, in an
act 277 shown inFIG. 2B , the CVS will check if the recipient party is a first time user to the call verification service. Provided so (answer Yes to act 277), theCVS 100 will request a challenge from the recipient party in afurther act 280. The challenge will correspond to a user defined test uniquely known to the user, thereby showing that the call is actually a verified call under the present call verification service. The challenge may be for instance a voice prompt that the user B of the recipient device may record for subsequent replay with each incoming verified call. Such a challenge will be stored in afurther act 282 in relation to the recipient party indatabase 115, using for instance its phone number at the entry in the database. An imposter trying to copy the present verification service will not be able to access the user based challenge. The service may carry on with presenting further information about the calling party in anact 282, such as full name, website info, or any other data collected during registration of acts 210-230 inFIG. 2A . - Once the recipient party is no longer a first time user (answer No to act 277), the
CVS 100 will retrieve indatabase 115 the data stored in relation to the recipient party entry in afurther act 290, e.g. the challenge provided inact 280. The challenge, such as a voice prompt with the User B own voice, will be presented to the recipient device. This may alternatively be further questions, or recognition of objects initially provided by the user B. In afurther act 292, the CVS will present a second notification based on the retrieved data, here the stored challenge. This corresponds to the setup message “setup 7” inFIGS. 1A and 1B . Provided the challenge is correct validated by the user B (voice prompt acknowledged, right answer to the question . . . ), the present call verification service will proceed to act 284 with providing additional information about the calling party. - Once the call is verified and accepted by the
recipient party 102, a call, i.e. a communication path, is established between the calling party and the recipient party. - Thanks to the present system, a user can enjoy a call verification service allowing only certified/verified calls from calling parties such as businesses. Using a token provided at registration of a calling party, the
CVS 100 will only process calls from registered parties. - The present system also bring enhanced trust to the callee as to whom is behind the incoming call.
- Finally, the above-discussion is intended to be merely illustrative of the present system and should not be construed as limiting the appended claims to any particular embodiment or group of embodiments. Thus, while the present system has been described with reference to exemplary embodiments, it should also be appreciated that numerous modifications and alternative embodiments may be devised by those having ordinary skill in the art without departing from the broader and intended spirit and scope of the present system as set forth in the claims that follow.
- The section headings included herein are intended to facilitate a review but are not intended to limit the scope of the present system. Accordingly, the specifications and drawings are to be regarded in an illustrative manner and are not intended to limit the scope of the appended claims.
Claims (12)
1. A method to verify a calling party when placing a call to a recipient party, the method comprising:
receiving at an Application Program Interface (API) platform a request from a calling party for registration for the calling party verification,
sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
setting up a call to the recipient party, when there is a match between the first and second token.
2. The method of claim 1 , wherein the request for registration further comprises a first identifier for the calling party, the act of sending a first token further comprising:
storing at the API platform the first identifier in relation to the first token.
3. The method of claim 2 , the act of sending a first token comprising a preliminary act of:
generating the first token based at least on the first identifier.
4. The method of claim 2 , wherein the request for setting up a call further comprises the first identifier for the calling party, the act of setting up a call further comprising:
generating a Caller ID based on the first identifier,
setting up a call to the recipient party using the generated Caller ID as the Caller ID to the call.
5. The method of claim 4 , the act of generating a Caller ID further comprising:
generating a Caller ID based on the result of the match between the first and second token.
6. The method of claim 2 , wherein the request to set up a call further comprises a second identifier for the calling party, the act of setting up a call further comprising:
setting up a call to the recipient party, when there is a match between the first and second token and a further match between the first and second identifiers.
7. The method of claim 1 , wherein the request to set up a call further comprises a second identifier for the calling party, the method further comprising:
generating a Caller ID based on the second identifier,
setting up a call to the recipient party using the generated Caller ID as the Caller ID to the call.
8. The method of claim 1 , the act of setting up a call further comprising:
presenting a first notification to the recipient party, the notification comprising an indication that the call is verified.
9. The method of claim 8 , further comprising:
receiving, in reply to the first notification, a request for further verification from the recipient party,
retrieving at the API platform data related to the recipient party,
presenting a second notification to the recipient party, the second notification being based on the retrieved data.
10. A call verification server to verify a calling party when placing a call to a recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
receive at the API platform a request from a calling party for registration for the calling party verification,
send to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
receive at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
set up a call to the recipient party, when there is a match between the first and second token.
11. A telecommunication system comprising:
a calling party
a recipient party
a call verification server to verify the calling party when placing a call to the recipient party, the call verification server comprising an Application Program Interface (API) platform and being configured to:
receive at the API platform a request from a calling party for registration for the calling party verification,
send to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
receive at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
set up a call to the recipient party, when there is a match between the first and second token.
12. An application embodied on a non-transitory computer readable medium and configured to verify a calling party when placing a call to a recipient party, the application comprising instructions for:
receiving at an Application Program Interface (API) platform a request from the calling party for registration for the calling party verification,
sending to the calling party, as a response to the request for registration, a first token associated at the API platform to the calling party,
receiving at the API platform a request to set up a call, the request comprising a recipient party for the call, and a second token,
setting up a call to the recipient party, when there is a match between the first and second token.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/312,337 US20170104870A1 (en) | 2014-06-25 | 2015-06-22 | A method to authenticate calls in a telecommunication system |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462016996P | 2014-06-25 | 2014-06-25 | |
US15/312,337 US20170104870A1 (en) | 2014-06-25 | 2015-06-22 | A method to authenticate calls in a telecommunication system |
PCT/IB2015/001181 WO2015198136A1 (en) | 2014-06-25 | 2015-06-22 | A method to authenticate calls in a telecommunication system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170104870A1 true US20170104870A1 (en) | 2017-04-13 |
Family
ID=54266585
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/312,337 Abandoned US20170104870A1 (en) | 2014-06-25 | 2015-06-22 | A method to authenticate calls in a telecommunication system |
Country Status (3)
Country | Link |
---|---|
US (1) | US20170104870A1 (en) |
EP (1) | EP3162104B1 (en) |
WO (1) | WO2015198136A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018118999A1 (en) | 2016-12-20 | 2018-06-28 | Hiya, Inc. | Out-of-band call verification |
US20180278746A1 (en) * | 2017-03-24 | 2018-09-27 | Vonage Business Inc. | Systems and methods for providing call verification |
US10992799B2 (en) | 2018-12-18 | 2021-04-27 | Wells Fargo Bank, N.A. | Caller identification trust |
CN113965648A (en) * | 2020-07-21 | 2022-01-21 | 中国移动通信集团山东有限公司 | Information hiding method and device and electronic equipment |
US20220086637A1 (en) * | 2020-09-11 | 2022-03-17 | Samsung Sds Co., Ltd. | Method for authentication, user terminal and authentication server for executing the same |
CN114629672A (en) * | 2020-12-14 | 2022-06-14 | 中国电信股份有限公司 | Method, system and storage medium for improving security of voice call based on token authentication |
US20220247859A1 (en) * | 2020-09-25 | 2022-08-04 | Mitel Networks (International) Limited | Communication system for mitigating incoming spoofed callers using social media |
US20220245747A1 (en) * | 2021-01-29 | 2022-08-04 | Techjutsu Inc. | System and method for caller verification |
US11595515B2 (en) * | 2019-09-30 | 2023-02-28 | Ringcentral, Inc. | System and method of caller verification |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10721226B1 (en) | 2017-03-10 | 2020-07-21 | Wells Fargo Bank, N.A. | User-level token for user authentication via a user device |
US11763303B1 (en) | 2017-03-10 | 2023-09-19 | Wells Fargo Bank, N.A. | Identity management service via a user-level token |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5901203A (en) * | 1996-06-28 | 1999-05-04 | Distributed Software Development, Inc. | Computer-based system and method for identifying an unidentified caller |
US20030135740A1 (en) * | 2000-09-11 | 2003-07-17 | Eli Talmor | Biometric-based system and method for enabling authentication of electronic messages sent over a network |
US20060021011A1 (en) * | 2004-06-29 | 2006-01-26 | International Business Machines Corporation | Identity access management system |
US20070201660A1 (en) * | 2006-01-26 | 2007-08-30 | International Business Machines Corporation | Method and apparatus for blocking voice call spam |
US20080137828A1 (en) * | 2006-12-12 | 2008-06-12 | Mazen Chmaytelli | Systems and methods for caller identification customization and remote management of communication devices |
US20080181379A1 (en) * | 2007-01-30 | 2008-07-31 | Alcatel Lucent | Caller name authentication to prevent caller identity spoofing |
US20100319063A1 (en) * | 2009-06-12 | 2010-12-16 | Microsoft Corporation | Access control to secured application features using client trust levels |
US8238532B1 (en) * | 2009-05-19 | 2012-08-07 | TrustID, Inc. | Method of and system for discovering and reporting trustworthiness and credibility of calling party number information |
US20140341366A1 (en) * | 2013-05-15 | 2014-11-20 | Verizon Patent And Licensing Inc. | Call control for web calls |
US20150044997A1 (en) * | 2013-08-08 | 2015-02-12 | Vonage Network Llc | Method and apparatus for verifying the authenticity of mobile device information |
US20150050914A1 (en) * | 2013-08-13 | 2015-02-19 | Vonage Network Llc | Method and apparatus for verifying a device during provisioning through caller id |
US9060057B1 (en) * | 2013-03-07 | 2015-06-16 | Serdar Artun Danis | Systems and methods for caller ID authentication, spoof detection and list based call handling |
US9277049B1 (en) * | 2013-03-07 | 2016-03-01 | Serdar Artun Danis | Systems and methods for caller ID and call destination authentication |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7921299B1 (en) * | 2003-12-05 | 2011-04-05 | Microsoft Corporation | Partner sandboxing in a shared multi-tenant billing system |
EP1902564A2 (en) * | 2005-07-12 | 2008-03-26 | France Telecom | Mechanism for protecting h.323 networks for call set-up functions |
KR101281882B1 (en) | 2009-10-12 | 2013-07-03 | 한국전자통신연구원 | Caller certification method and system for phishing prevention |
-
2015
- 2015-06-22 US US15/312,337 patent/US20170104870A1/en not_active Abandoned
- 2015-06-22 EP EP15777729.3A patent/EP3162104B1/en active Active
- 2015-06-22 WO PCT/IB2015/001181 patent/WO2015198136A1/en active Application Filing
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5901203A (en) * | 1996-06-28 | 1999-05-04 | Distributed Software Development, Inc. | Computer-based system and method for identifying an unidentified caller |
US20030135740A1 (en) * | 2000-09-11 | 2003-07-17 | Eli Talmor | Biometric-based system and method for enabling authentication of electronic messages sent over a network |
US20060021011A1 (en) * | 2004-06-29 | 2006-01-26 | International Business Machines Corporation | Identity access management system |
US20070201660A1 (en) * | 2006-01-26 | 2007-08-30 | International Business Machines Corporation | Method and apparatus for blocking voice call spam |
US20080137828A1 (en) * | 2006-12-12 | 2008-06-12 | Mazen Chmaytelli | Systems and methods for caller identification customization and remote management of communication devices |
US20080181379A1 (en) * | 2007-01-30 | 2008-07-31 | Alcatel Lucent | Caller name authentication to prevent caller identity spoofing |
US8238532B1 (en) * | 2009-05-19 | 2012-08-07 | TrustID, Inc. | Method of and system for discovering and reporting trustworthiness and credibility of calling party number information |
US20100319063A1 (en) * | 2009-06-12 | 2010-12-16 | Microsoft Corporation | Access control to secured application features using client trust levels |
US9060057B1 (en) * | 2013-03-07 | 2015-06-16 | Serdar Artun Danis | Systems and methods for caller ID authentication, spoof detection and list based call handling |
US9277049B1 (en) * | 2013-03-07 | 2016-03-01 | Serdar Artun Danis | Systems and methods for caller ID and call destination authentication |
US20140341366A1 (en) * | 2013-05-15 | 2014-11-20 | Verizon Patent And Licensing Inc. | Call control for web calls |
US20150044997A1 (en) * | 2013-08-08 | 2015-02-12 | Vonage Network Llc | Method and apparatus for verifying the authenticity of mobile device information |
US20150050914A1 (en) * | 2013-08-13 | 2015-02-19 | Vonage Network Llc | Method and apparatus for verifying a device during provisioning through caller id |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3566427A4 (en) * | 2016-12-20 | 2019-12-11 | Hiya, Inc. | Out-of-band call verification |
WO2018118999A1 (en) | 2016-12-20 | 2018-06-28 | Hiya, Inc. | Out-of-band call verification |
US20180278746A1 (en) * | 2017-03-24 | 2018-09-27 | Vonage Business Inc. | Systems and methods for providing call verification |
US10110740B2 (en) * | 2017-03-24 | 2018-10-23 | Vonage Business Inc. | Systems and methods for providing call verification |
US11218590B2 (en) * | 2017-03-24 | 2022-01-04 | Vonage Business, Inc. | Systems and methods for providing call verification |
US11509765B1 (en) | 2018-12-18 | 2022-11-22 | Wells Fargo Bank, N.A. | Caller identification trust |
US10992799B2 (en) | 2018-12-18 | 2021-04-27 | Wells Fargo Bank, N.A. | Caller identification trust |
US11902464B1 (en) | 2018-12-18 | 2024-02-13 | Wells Fargo Bank, N.A. | Caller identification trust |
US11595515B2 (en) * | 2019-09-30 | 2023-02-28 | Ringcentral, Inc. | System and method of caller verification |
CN113965648A (en) * | 2020-07-21 | 2022-01-21 | 中国移动通信集团山东有限公司 | Information hiding method and device and electronic equipment |
US20220086637A1 (en) * | 2020-09-11 | 2022-03-17 | Samsung Sds Co., Ltd. | Method for authentication, user terminal and authentication server for executing the same |
US11683686B2 (en) * | 2020-09-11 | 2023-06-20 | Samsung Sds Co., Ltd. | Method for authentication, user terminal and authentication server for executing the same |
US20220247859A1 (en) * | 2020-09-25 | 2022-08-04 | Mitel Networks (International) Limited | Communication system for mitigating incoming spoofed callers using social media |
US11917098B2 (en) * | 2020-09-25 | 2024-02-27 | Mitel Networks Corporation | Communication system for mitigating incoming spoofed callers using social media |
CN114629672A (en) * | 2020-12-14 | 2022-06-14 | 中国电信股份有限公司 | Method, system and storage medium for improving security of voice call based on token authentication |
US20220245747A1 (en) * | 2021-01-29 | 2022-08-04 | Techjutsu Inc. | System and method for caller verification |
Also Published As
Publication number | Publication date |
---|---|
EP3162104A1 (en) | 2017-05-03 |
EP3162104B1 (en) | 2022-11-02 |
WO2015198136A1 (en) | 2015-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3162104B1 (en) | A method to authenticate calls in a telecommunication system | |
US10244105B2 (en) | Methods and systems for real time display of caller location, profile, and trust relationship | |
US9781255B1 (en) | Authentication of phone call origination | |
US8879540B1 (en) | Systems, methods, devices and arrangements for emergency call services | |
US20090025075A1 (en) | On-demand authentication of call session party information during a telephone call | |
US10893138B2 (en) | Caller identity and authentication service | |
US11570296B2 (en) | End-to-end management of authenticated communications | |
US9860228B2 (en) | Pre-delivery authentication | |
US8965342B1 (en) | Method and apparatus for verifying the authenticity of mobile device information | |
US11671468B2 (en) | Authenticated calling voicemail integration | |
US20200220837A1 (en) | System and method to use a mobile number in conjunction with a non-telephony internet connected device | |
JP2013534757A (en) | Method and system for routing communications | |
US10244107B1 (en) | Systems and methods for causing display of a reputation indicator associated with a called party | |
RU2689441C1 (en) | System and method of monitoring communication, and/or detecting scammers, and/or authenticating statements/allegations of belonging to any organization | |
US10778732B2 (en) | Method of detecting a spoofing of identity belonging to a domain | |
CN108235310A (en) | Method, server and the system of identification camouflage telephone number | |
FR3096207A1 (en) | Method for determining a spoofing of at least one identifier | |
CN111224918A (en) | Real-time networking security control platform and access authentication method | |
KR20150031503A (en) | The Method of Confirmation about Valid Caller ID Using Group Information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |